CN110929278A - Ansible-based cloud database authority management system and method - Google Patents

Ansible-based cloud database authority management system and method Download PDF

Info

Publication number
CN110929278A
CN110929278A CN201911148364.3A CN201911148364A CN110929278A CN 110929278 A CN110929278 A CN 110929278A CN 201911148364 A CN201911148364 A CN 201911148364A CN 110929278 A CN110929278 A CN 110929278A
Authority
CN
China
Prior art keywords
database
management
user
infrastructure
operation command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911148364.3A
Other languages
Chinese (zh)
Inventor
杨超
赵山
王阳
厉颖
赵建昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN201911148364.3A priority Critical patent/CN110929278A/en
Publication of CN110929278A publication Critical patent/CN110929278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an authorization management system and method based on an infrastructure cloud database, and belongs to the technical field of application of infrastructure and database service support in a cloud computing environment. The invention discloses an authorization management system based on an infrastructure cloud database, which comprises a database security control platform, an operation command analysis and organization module, an infrastructure executor and a database interpretation and execution operation module, wherein the database security control platform is responsible for receiving a management operation command sent by a management account; the operation command analysis and organization module analyzes the operation executed by the command according to the received operation command; and the infrastructure executor sends the related management operation command to the corresponding database instance. The authority management system based on the infrastructure cloud database has high safety, good expansibility and good popularization and application values.

Description

Ansible-based cloud database authority management system and method
Technical Field
The invention relates to the technical field of application of an infrastructure and database service support in a cloud computing environment, and particularly provides a system and a method for managing database permissions based on the infrastructure.
Background
The infrastructure is a configuration management system for realizing functions of batch system configuration, batch program deployment, batch operation commands and the like, and can well complete deployment and operation of applications. Under the current background of cloud computing and big data, data of modern enterprises and governments are developing towards large capacity, wherein the database has an increasingly large proportion in data, business algorithms and analysis statistics, and under the condition of continuously giving out warnings of malignant events such as user data external transmission, enterprise business secret leakage, hacking damage and the like, the management and protection of the database become especially important. The entrance authorities of the database facing user connection and program connection are all silent full-open, and the database can be directly changed without reservation under the condition of malicious damage, so that the database is seriously damaged. And when the database instances are more in the cloud environment, the management work is more complex, the work efficiency is greatly reduced by manually setting the authority, and the risk of manual misoperation is increased.
Disclosure of Invention
The technical task of the invention is to provide an infrastructure-based cloud database permission management system which is high in safety, good in expansibility and capable of setting classification permission management aiming at different databases of different users in a batch and multi-way manner, aiming at the problems.
The invention further provides an authorization management method based on the infrastructure cloud database.
In order to achieve the purpose, the invention provides the following technical scheme:
an authorization management system based on an infrastructure cloud database comprises a database security management and control platform, an operation command analysis and organization module, an infrastructure executor and a database interpretation and execution operation module, wherein the database security management and control platform is responsible for receiving a management operation command sent by a management account; the operation command analysis and organization module analyzes the operation executed by the command according to the received operation command; the ansable executor sends a related management operation command to a corresponding database instance; and the database interpretation and execution operation module is used for interpreting and executing the sent instruction according to the infrastructure executor.
The safety control platform simulates and logs in the database by using the database administrator account information according to the database administrator account information corresponding to the safety control platform on the database, simulates and logs in the database by adopting the authority of the corresponding management operation of the database administrator account to the account information stored in the database, manages and operates the account information stored in the database by adopting the authority of the corresponding management operation of the database administrator account, and improves safety. Compared with the traditional login database, the method has the advantages that the efficiency is improved and the manual operation errors are reduced by singly establishing the user through the command line and giving the authority; when a large database cluster or a plurality of database clusters are deployed in a cloud computing environment, the management capacity and efficiency of the database are improved. And the sending of the operation command is preprocessed through a safety control platform and a program, so that the safety in the operation process is ensured.
The database instance can only execute corresponding operation according to the management operation command sent by the database security management and control platform, thereby realizing authorization flow, high efficiency and security.
Preferably, the database security management and control platform predefines and sets a management account of the user according to information of a database account manager, and the management account has the highest management authority.
Preferably, the operation command analysis and organization module analyzes and organizes account management operation commands executable by a specific database, including a create operation command, a modify operation command, an authorize operation command and a cancel authorize operation command.
Preferably, the infrastructure executor sends the related management operation command to the corresponding database instance, and enables the infrastructure executor to execute the corresponding operation to the corresponding database according to the management account.
Preferably, the interpretation execution of the database interpretation execution operation module is used for searching a corresponding database table structure when modification or deletion operation is performed, and filtering the table data according to the condition to generate a correct result corresponding to the operation.
In the method, a user logs in a security account of a database security control platform and sends a management operation command through the security account, and after the database security control platform receives the management operation command, the management operation command and information of the security account are sent to a database instance through an Angle actuator, so that the database can adopt an administrator user corresponding to the security account and execute corresponding management operation according to the received management operation command.
Preferably, the method comprises database user management and database management, and the database user management and the database management comprise creation operation commands, modification operation commands, authorization operation commands and revocation authorization operation commands.
Preferably, the database user management comprises the steps of:
s1, the database security management and control platform sends a database user related operation instruction;
s2, analyzing the operation command to create database user, modify database user or delete database user, executing step S3 if creating database user operation, or executing step S4 if modifying database or deleting database user operation;
s3, creating a database user, and organizing the database authority if the user is authorized to the corresponding database during creation;
s4, if the database user is modified or deleted, judging whether the user object exists, if not, throwing out the abnormal condition, ending the processing, if so, revoking the authority of the user to the database if the database user is modified, then granting the new authority of the user to the database, if the database user is deleted, deleting all the authorities of the user, and deleting the management record of the user in the corresponding table;
s5, according to the management operation command, calling an infrastructure executor corresponding to the management operation command, calling a command script preset by the infrastructure executor, and sending the management operation command to a data instance;
and S6, the database instance is interpreted and executed, and the operation result is returned to the database security management and control platform.
If the alarm occurs, an early warning mechanism is triggered, and an operation log is recorded. The reason for adopting the early warning mechanism is that for the specified modification operation, if the operation is not the program standard operation or has unknown abnormity, the early warning notification and recording can be realized. For example, the authority of the database corresponding to the user is modified, if the authorization range is not in the set range, the operation is regarded as unsafe, recording can be performed, and forced correction is performed on the security management and control platform.
Preferably, the database management comprises the steps of:
sa, the database security control platform sends database related operation instructions;
sb, analyzing the operation command to create a database, modify the database or delete the database, if the operation command is the operation of creating the database, executing the step Sc, and if the operation command is the operation of modifying the database or deleting the database, executing the step Sd;
sc, creating a database, and if corresponding users are authorized to the database while creating, organizing the data authority of the users;
sd, if the operation is database modification or database deletion, judging whether the database exists, if the operation does not exist, throwing out an exception, ending the processing, if the operation exists, if the operation corresponds to the user permission of the database modification, revoking the permission of the database to the user, granting a new permission of the database to the user, if the operation corresponds to the database deletion, deleting all permissions of the database, and deleting the management record of the database in a corresponding table;
se, according to the management operation command, calling an interrupt executor corresponding to the management operation command, calling a preset command script of the interrupt executor, and sending the management operation command to the data instance;
and Sf, explaining and executing the database instance, and returning an operation result to the database security control platform.
Compared with the prior art, the method for managing the authority based on the infrastructure cloud database has the following outstanding advantages:
according to the method for managing the authority of the cloud database based on the infrastructure, the authority of a plurality of database examples in the field of cloud computing is managed, a user only needs to pay attention to own service requirements, analysis and design of related operation commands of the database are not needed, and classified authority management of different databases without users can be set in a batch and multi-way mode;
secondly, the security is high, the operation types and the authorities of users in different levels are strictly controlled from the service management, the database can be divided into certain isolation sections to be operated step by step, the influence caused by illegal operation is cut off, and the integrity and the stability of production data are protected from the entrance range; meanwhile, the program operation mode can be predefined from the aspect of implementation control, and a partition is virtualized to perform data isolation of corresponding operation, so that only authorized data is submitted to the formal environment under authorized operation; moreover, for user operation with a certain rule, a certain early warning mechanism can be triggered to inform corresponding personnel to carry out follow-up analysis, so that errors of manual operation are reduced, and the safety is greatly improved;
thirdly, the expansibility is good, the security control platform for logging in the database sends a management operation command to execute corresponding operation, and therefore the minimized control of the authority of account management operation is achieved; meanwhile, the authority of the related user management operation can be modified in the database security management and control platform according to the requirement, so that the expansibility of the user management operation authority can be realized, and the efficiency is improved.
Drawings
FIG. 1 is an architecture diagram of an authorization management system based on an infrastructure cloud database according to the present invention;
fig. 2 is a flowchart of the method for managing the authority based on the infrastructure cloud database according to the present invention.
Detailed Description
The system and method for managing the authority of the cloud database based on the anchor according to the present invention will be described in detail with reference to the accompanying drawings and embodiments.
Examples
As shown in fig. 1, the authority management system based on an anchor cloud database of the present invention includes a database security management and control platform, an operation command analysis and organization module, an anchor executor, and a database interpretation and execution operation module.
And the database security control platform predefines and sets a management account of the user according to the information of the database account manager, has the highest management authority, and is responsible for receiving a management operation command sent by the management account.
The operation command analysis and organization module analyzes the operation executed by the command according to the received operation command. Analyzing and organizing account management operation commands executable by a specific database, wherein the account management operation commands comprise a creation operation command, a modification operation command, an authorization operation command and a revocation authorization operation command.
And the infrastructure executor sends the related management operation command to the corresponding database instance, and enables the infrastructure executor to execute corresponding operation on the corresponding database according to the management account.
And the database interpretation and execution operation module is used for interpreting and executing the sent instruction according to the infrastructure executor. The interpretation execution is to search the corresponding database table structure when modifying or deleting operation is carried out, and to filter the table data according to the condition to generate the correct result corresponding to the operation.
The safety control platform uses the database administrator account information to log in the database in a simulation mode according to the database administrator account information corresponding to the database, the authority of corresponding management operation of the database administrator account is adopted to log in the database in a simulation mode, the authority of corresponding management operation of the database administrator account is adopted to manage the account information stored in the database, and safety is improved. Compared with the traditional login database, the method has the advantages that the efficiency is improved and the manual operation errors are reduced by singly establishing the user through the command line and giving the authority; when a large database cluster or a plurality of database clusters are deployed in a cloud computing environment, the management capacity and efficiency of the database are improved. And the sending of the operation command is preprocessed through a safety control platform and a program, so that the safety in the operation process is ensured.
According to the method for managing the authority of the cloud database based on the infrastructure, a user logs in a security account of a security control platform of the database and sends a management operation command through the security account, and after the security control platform of the database receives the management operation command, the management operation command and information of the security account are sent to a database instance through an infrastructure actuator, so that the database can adopt an administrator user corresponding to the security account to execute corresponding management operation according to the received management operation command.
As shown in fig. 2, the method includes database user management and database management, and the database user management and the database management each include a create operation command, a modify operation command, an authorize operation command, and a revoke authorization operation command.
The database user management comprises the following steps:
s1, the database security management and control platform sends a database user related operation instruction;
s2, analyzing the operation command to create database user, modify database user or delete database user, executing step S3 if creating database user operation, or executing step S4 if modifying database or deleting database user operation;
s3, creating a database user, and organizing the database authority if the user is authorized to the corresponding database during creation;
s4, if the database user is modified or deleted, judging whether the user object exists, if not, throwing out the abnormal condition, ending the processing, if so, revoking the authority of the user to the database if the database user is modified, then granting the new authority of the user to the database, if the database user is deleted, deleting all the authorities of the user, and deleting the management record of the user in the corresponding table;
s5, according to the management operation command, calling an infrastructure executor corresponding to the management operation command, calling a command script preset by the infrastructure executor, and sending the management operation command to a data instance;
and S6, the database instance is interpreted and executed, and the operation result is returned to the database security management and control platform.
If the alarm occurs, an early warning mechanism is triggered, and an operation log is recorded. The reason for adopting the early warning mechanism is that for the specified modification operation, if the operation is not the program standard operation or has unknown abnormity, the early warning notification and recording can be realized. For example, the authority of the database corresponding to the user is modified, if the authorization range is not in the set range, the operation is regarded as unsafe, recording can be performed, and forced correction is performed on the security management and control platform.
The database management comprises the following steps:
sa, the database security control platform sends database related operation instructions;
sb, analyzing the operation command to create a database, modify the database or delete the database, if the operation command is the operation of creating the database, executing the step Sc, and if the operation command is the operation of modifying the database or deleting the database, executing the step Sd;
sc, creating a database, and if corresponding users are authorized to the database while creating, organizing the data authority of the users;
sd, if the operation is database modification or database deletion, judging whether the database exists, if the operation does not exist, throwing out an exception, ending the processing, if the operation exists, if the operation corresponds to the user permission of the database modification, revoking the permission of the database to the user, granting a new permission of the database to the user, if the operation corresponds to the database deletion, deleting all permissions of the database, and deleting the management record of the database in a corresponding table;
se, according to the management operation command, calling an interrupt executor corresponding to the management operation command, calling a preset command script of the interrupt executor, and sending the management operation command to the data instance;
and Sf, explaining and executing the database instance, and returning an operation result to the database security control platform.
The above-described embodiments are merely preferred embodiments of the present invention, and general changes and substitutions by those skilled in the art within the technical scope of the present invention are included in the protection scope of the present invention.

Claims (9)

1. The utility model provides a based on ansable cloud database rights management system which characterized in that: the system comprises a database security control platform, an operation command analysis and organization module, an infrastructure executor and a database interpretation and execution operation module, wherein the database security control platform is responsible for receiving a management operation command sent by a management account; the operation command analysis and organization module analyzes the operation executed by the command according to the received operation command; the ansable executor sends a related management operation command to a corresponding database instance; and the database interpretation and execution operation module is used for interpreting and executing the sent instruction according to the infrastructure executor.
2. The infrastructure-based cloud database privilege management system of claim 1, wherein: and the database security control platform predefines and sets a management account of a user according to the information of database account management personnel, and has the highest management authority.
3. The infrastructure-based cloud database privilege management system of claim 2, wherein: the operation command analysis and organization module analyzes and organizes account management operation commands executable by a specific database, including creating operation commands, modifying operation commands, authorizing operation commands and canceling authorized operation commands.
4. The infrastructure-based cloud database privilege management system of claim 3, wherein: and the infrastructure executor sends the related management operation command to the corresponding database instance, and enables the infrastructure executor to execute corresponding operation on the corresponding database according to the management account.
5. The infrastructure-based cloud database privilege management system of claim 4, wherein: the database interpretation execution operation module is used for performing interpretation execution, searching a corresponding database table structure when modification or deletion operation is performed, and filtering table data according to conditions to generate a correct result corresponding to the operation.
6. A method for managing the authority of a cloud database based on Angle is characterized in that: according to the method, a user logs in a security account of a database security control platform, a management operation command is sent through the security account, and after the database security control platform receives the management operation command, the management operation command and information of the security account are sent to a database instance through an android actuator, so that the database can adopt an administrator user corresponding to the security account to execute corresponding management operation according to the received management operation command.
7. The infrastructure-based cloud database privilege management method of claim 6, wherein: the method comprises database user management and database management, wherein the database user management and the database management respectively comprise an operation creating command, an operation modifying command, an operation authorizing command and an operation canceling command.
8. The infrastructure-based cloud database privilege management method of claim 7, wherein:
the database user management comprises the following steps:
s1, the database security management and control platform sends a database user related operation instruction;
s2, analyzing the operation command to create database user, modify database user or delete database user, executing step S3 if creating database user operation, or executing step S4 if modifying database or deleting database user operation;
s3, creating a database user, and organizing the database authority if the user is authorized to the corresponding database during creation;
s4, if the database user is modified or deleted, judging whether the user object exists, if not, throwing out the abnormal condition, ending the processing, if so, revoking the authority of the user to the database if the database user is modified, then granting the new authority of the user to the database, if the database user is deleted, deleting all the authorities of the user, and deleting the management record of the user in the corresponding table;
s5, according to the management operation command, calling an infrastructure executor corresponding to the management operation command, calling a command script preset by the infrastructure executor, and sending the management operation command to a data instance;
and S6, the database instance is interpreted and executed, and the operation result is returned to the database security management and control platform.
9. The infrastructure-based cloud database privilege management method of claim 7, wherein:
the database management comprises the following steps:
sa, the database security control platform sends database related operation instructions;
sb, analyzing the operation command to create a database, modify the database or delete the database, if the operation command is the operation of creating the database, executing the step Sc, and if the operation command is the operation of modifying the database or deleting the database, executing the step Sd;
sc, creating a database, and if corresponding users are authorized to the database while creating, organizing the data authority of the users;
sd, if the operation is database modification or database deletion, judging whether the database exists, if the operation does not exist, throwing out an exception, ending the processing, if the operation exists, if the operation corresponds to the user permission of the database modification, revoking the permission of the database to the user, granting a new permission of the database to the user, if the operation corresponds to the database deletion, deleting all permissions of the database, and deleting the management record of the database in a corresponding table;
se, according to the management operation command, calling an interrupt executor corresponding to the management operation command, calling a preset command script of the interrupt executor, and sending the management operation command to the data instance;
and Sf, explaining and executing the database instance, and returning an operation result to the database security control platform.
CN201911148364.3A 2019-11-21 2019-11-21 Ansible-based cloud database authority management system and method Pending CN110929278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911148364.3A CN110929278A (en) 2019-11-21 2019-11-21 Ansible-based cloud database authority management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911148364.3A CN110929278A (en) 2019-11-21 2019-11-21 Ansible-based cloud database authority management system and method

Publications (1)

Publication Number Publication Date
CN110929278A true CN110929278A (en) 2020-03-27

Family

ID=69850625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911148364.3A Pending CN110929278A (en) 2019-11-21 2019-11-21 Ansible-based cloud database authority management system and method

Country Status (1)

Country Link
CN (1) CN110929278A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112269776A (en) * 2020-11-18 2021-01-26 四川长虹电器股份有限公司 Database operation and maintenance management platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102456015A (en) * 2010-10-25 2012-05-16 ***通信集团河南有限公司 Method, system and device for managing account number information in database
US20150136531A1 (en) * 2012-05-15 2015-05-21 Otis Elevator Company Elevator backup power supply
CN104766023A (en) * 2015-02-02 2015-07-08 苏州全维软件科技有限公司 User management method based on ORACLE database
CN105844142A (en) * 2016-03-16 2016-08-10 上海新炬网络信息技术有限公司 Safe centralized management and control method of database account
CN109889381A (en) * 2019-02-18 2019-06-14 国家计算机网络与信息安全管理中心 Automatic configuration management method and device based on fort machine
CN110233893A (en) * 2019-06-12 2019-09-13 浪潮软件集团有限公司 A kind of method and system that the server file based on ansible efficiently updates
CN110276594A (en) * 2019-06-21 2019-09-24 深圳前海微众银行股份有限公司 A kind of banking operational system and method based on Ansible

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102456015A (en) * 2010-10-25 2012-05-16 ***通信集团河南有限公司 Method, system and device for managing account number information in database
US20150136531A1 (en) * 2012-05-15 2015-05-21 Otis Elevator Company Elevator backup power supply
CN104766023A (en) * 2015-02-02 2015-07-08 苏州全维软件科技有限公司 User management method based on ORACLE database
CN105844142A (en) * 2016-03-16 2016-08-10 上海新炬网络信息技术有限公司 Safe centralized management and control method of database account
CN109889381A (en) * 2019-02-18 2019-06-14 国家计算机网络与信息安全管理中心 Automatic configuration management method and device based on fort machine
CN110233893A (en) * 2019-06-12 2019-09-13 浪潮软件集团有限公司 A kind of method and system that the server file based on ansible efficiently updates
CN110276594A (en) * 2019-06-21 2019-09-24 深圳前海微众银行股份有限公司 A kind of banking operational system and method based on Ansible

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112269776A (en) * 2020-11-18 2021-01-26 四川长虹电器股份有限公司 Database operation and maintenance management platform

Similar Documents

Publication Publication Date Title
US10511632B2 (en) Incremental security policy development for an enterprise network
Nourian et al. A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet
US11700264B2 (en) Systems and methods for role-based computer security configurations
EP3660717B1 (en) Dynamic authorization of requested actions using adaptive context-based matching
US20160364576A1 (en) Operating large scale systems and cloud services with zero-standing elevated permissions
US7555645B2 (en) Reactive audit protection in the database (RAPID)
CN106469068B (en) Application program deployment method and system
EP3493090B1 (en) Control method and unit of mobile storage devices, and storage medium
US9639713B2 (en) Secure endpoint file export in a business environment
US9432369B2 (en) Secure data containers
US11956240B2 (en) Systems and methods for temporary access with adaptive trust levels for authentication and authorization
CN111630532A (en) Asset management apparatus and method
CN110929278A (en) Ansible-based cloud database authority management system and method
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN102270132B (en) Control method for script action in Linux operating system
CN114615055A (en) Processing method of access request, data uploading method and device
CN114021160A (en) Method, system and medium for regulating and controlling software control authority
CN103841050A (en) Local area network admission control method and system for nuclear power station analog machine
US9519759B2 (en) Secure access to programming data
CN111597525A (en) Resource management system security platform
Kern et al. Using RBAC to enforce the principle of least privilege in industrial remote maintenance sessions
CN114116042B (en) Command processing method and system for Linux service system
KR102047739B1 (en) Cloud-based Clean Security Module Remote Utilization System and Method
KR102107415B1 (en) Method for providing cyber secure guide
US20240089283A1 (en) System and method for centralized cybersecurity configuration compliance management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327